Abstracto
Study of system security architecture
Jiang He
This paper describes the hybrid nature of a DCEÂ’s communications and processing environment, including a discussion of the system security architecture that is present on each DCE memberÂ’s node. This section illustrates the position of the TMS as a decision-making layer that supports the key management system (KMS) with assessments of trustworthiness.
Descargo de responsabilidad: este resumen se tradujo utilizando herramientas de inteligencia artificial y aún no ha sido revisado ni verificado.